{"id":12063,"date":"2024-02-24T20:00:00","date_gmt":"2024-02-24T19:00:00","guid":{"rendered":"https:\/\/www.11onze.cat\/?p=12063"},"modified":"2024-02-24T20:10:57","modified_gmt":"2024-02-24T19:10:57","slug":"ransomware-cyberattack-files","status":"publish","type":"post","link":"https:\/\/www.11onze.cat\/en\/magazine\/ransomware-cyberattack-files\/","title":{"rendered":"Ransomware, the cyberattack that hijacks files"},"content":{"rendered":"<div class=\"component text\">\n  <div class=\"container\">\n\n\n    <div class=\"row\">\n      <div class=\"col  col-lg-8  offset-lg-2\">\n        <h3><b>It gives the cybercriminal the ability to lock a device from a remote location and encrypt our files, taking control of all stored information and data and not releasing it until we pay a ransom. Can we prevent it?<\/b><\/h3>\n<h3><\/h3>\n<p>&nbsp;<\/p>\n<h3><b>Ransomware in the 21st century<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Ransomware is one of the main cyber threats. There are <\/span><b>more than 1,100 variants<\/b><span style=\"font-weight: 400;\"> designed to attack businesses and private users. Technologies are becoming increasingly sophisticated. However, since 2019 there has been a considerable decrease in attacks on private individuals, and this is due to the fact that ransomware attacks are increasingly personalised towards specific targets. Attacks are<\/span><b> directed at a smaller number of organisations<\/b><span style=\"font-weight: 400;\"> and have a much higher success rate. Despite this, we must remain vigilant and adopt security measures that can protect us from these increasingly sophisticated threats. The digital currency, bitcoin, has become the currency of exchanges.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>What are the attacks like, and how can they be prevented?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Ransomware can attack in two ways: firstly, by <\/span><b>blocking entry into the operating system<\/b><span style=\"font-weight: 400;\">; and secondly, by <\/span><b>encrypting documents and files<\/b><span style=\"font-weight: 400;\"> stored on the hard drive, so that it is impossible to open or read them without the corresponding decryption key.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The advice given by experts to avoid a ransomware attack is the same as that which can be applied when surfing the Internet. Basic precautions, combined with common sense, can help to avoid these dangers. Some of the most basic are:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Keep the operating system <\/span><b>updated <\/b><span style=\"font-weight: 400;\">to avoid security breaches.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Have a good <\/span><b>antivirus<\/b><span style=\"font-weight: 400;\"> product installed and updated.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Do not open emails <\/b><span style=\"font-weight: 400;\">or files from unknown senders.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Do not open attachments<\/b><span style=\"font-weight: 400;\">, even if the sender is known. If no file has been requested, it is better not to open it, as it could be malicious software that has infected a contact&#8217;s computer and has automatically spread among their contacts.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Avoid browsing <\/span><b>unsafe pages<\/b><span style=\"font-weight: 400;\"> or pages with unverified content.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Always have an <\/span><b>up-to-date backup<\/b><span style=\"font-weight: 400;\">, it is the best way to avoid losing information.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Using <\/span><b>cloud<\/b><span style=\"font-weight: 400;\"> storage services can help mitigate a ransomware infection.<\/span><\/li>\n<\/ul>\n\n      <\/div>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n<div class=\"component gallery\">\n  <div class=\"container\">\n    <div class=\"row\">\n      <div class=\"col col-lg-10 offset-lg-1\">\n        <div id=\"slider\" class=\"carousel slide\">\n          <div class=\"carousel-inner\">\n            <div class=\"carousel-item active video-player inline-player\" data-video-id=\"6252010851001\">\n              <img decoding=\"async\" class=\"d-block w-100\" src=\"https:\/\/www.11onze.cat\/wp-content\/uploads\/2021\/05\/THUMBNAIL_DAVID_LOPEZ_TOPIC_2.jpg\" alt=\"\">\n              <button type=\"button\" class=\"play\"><\/button>\n              <div class=\"carousel-caption\">\n                <p>Ransomware<\/p>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n<\/div>\n\n<div class=\"component text\">\n  <div class=\"container\">\n\n\n    <div class=\"row\">\n      <div class=\"col  col-lg-8  offset-lg-2\">\n        <h3><b>What should we do if we suffer a ransomware attack?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">There are a number of protocols for dealing with ransomware attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The first step is to <\/span><b>create a copy of the infected hard drive<\/b><span style=\"font-weight: 400;\">. This leaves the main computer intact in case the files are corrupted when we try to decrypt them. This way we can always go back to square one. Also, if necessary, this copy could be used as evidence in a judicial investigation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Secondly, <\/span><b>disinfect the copy using an antivirus software<\/b><span style=\"font-weight: 400;\">. If you manage to free the documents, you can prevent the malware from re-encrypting them. The system would then be clean, but all affected files would still be encrypted.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The third step is to use a tool that helps <\/span><b>identify the malicious code variant <\/b><span style=\"font-weight: 400;\">that has attacked the system. Once the tool has recognised the code, apply the decryption programme best suited to the ransomware variant that affects you. It is possible that the decryption programme does not work, or that there is still no solution for the ransomware that has affected the computer; in this case, keep the encrypted hard drive in case a solution appears in the future.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another option is to contact a cybersecurity company, where technical experts in this malware will try to find a customised solution to the encryption.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>The first ever ransomware victim<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The first person to suffer a ransomware attack was Eddy Willems, a worker at an insurance company in Belgium. In 1989 his boss asked him to check what was on a floppy disk he had received from the WHO. The diskette was expected to contain medical research on AIDS, but when he loaded it, he found a message saying that the computer had been locked and that he had to make a deposit of $189 to an address in Panama.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is known as the world&#8217;s first ransomware attack and was called AIDS Trojan. The author of this attack was Joseph Popp, one of those involved in AIDS research. Why he decided to do this remains unknown. This first ransomware case in history was much simpler and more naive than those currently being carried out.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>11Onze is the community fintech of Catalonia. Open an account by downloading the super app El Canut for <\/b><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.e11onze.app&amp;utm_source=emailing&amp;utm_campaign=CANUT+launch\" target=\"_blank\" rel=\"noopener\"><b>Android<\/b><\/a><b> or <\/b><a href=\"https:\/\/apps.apple.com\/us\/app\/11onze\/id1566129237?utm_campaign=El+Canut\" target=\"_blank\" rel=\"noopener\"><b>iOS<\/b><\/a><b> and join the revolution!<\/b><\/p>\n\n      <\/div>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n<div class=\"component cards\">\n  <div class=\"container\">\n    <div class=\"row\">\n      <div class=\"col col-xl-8 offset-xl-2\">\n        <h1>If you liked this article, we recommend you read:<\/h1>\n        <div class=\"cards__wrapper\">\n          <div class=\"card\">\n            <a href=\"https:\/\/www.11onze.cat\/en\/magazine\/are-online-payment-methods-secure\/\" class=\"card-link\" target=\"_self\"><\/a>\n            <div class=\"card-img\">\n              <img decoding=\"async\" src=\"https:\/\/www.11onze.cat\/wp-content\/uploads\/2021\/04\/THUMBNAIL_POST_6-1.jpg\" class=\"card-img-top\" alt=\"\">\n                <span class=\"card-category\">Finances<\/span>\n            <\/div>\n            <div class=\"card-body\">\n              <p class=\"card-title p2\"><strong>Online payment methods<\/strong><\/p>\n              <span class=\"card-time\">5 min read<\/span>\n              <p class=\"card-text small\">Online shopping is becoming more widespread among all.<\/p>\n            <\/div>\n          <\/div>\n\n\n          <div class=\"card\">\n            <a href=\"https:\/\/www.11onze.cat\/en\/magazine\/how-protect-ourselves-online-scams\/\" class=\"card-link\" target=\"_self\"><\/a>\n            <div class=\"card-img\">\n              <img decoding=\"async\" src=\"https:\/\/www.11onze.cat\/wp-content\/uploads\/2021\/06\/THUMBNAIL_ESTAFES_ONLINE-800x533.jpg\" class=\"card-img-top\" alt=\"\">\n                <span class=\"card-category\">Finances<\/span>\n            <\/div>\n            <div class=\"card-body\">\n              <p class=\"card-title p2\"><strong>Online scams<\/strong><\/p>\n              <span class=\"card-time\">4 min read<\/span>\n              <p class=\"card-text small\">Every year, there are millions of people who suffer the effects of online scams.<\/p>\n            <\/div>\n          <\/div>\n\n\n          <div class=\"card\">\n            <a href=\"https:\/\/www.11onze.cat\/en\/magazine\/buy-now-pay-later\/\" class=\"card-link\" target=\"_self\"><\/a>\n            <div class=\"card-img\">\n              <img decoding=\"async\" src=\"https:\/\/www.11onze.cat\/wp-content\/uploads\/2021\/04\/THUMBNAIL_POST_5-1.jpg\" class=\"card-img-top\" alt=\"\">\n                <span class=\"card-category\">Finances<\/span>\n            <\/div>\n            <div class=\"card-body\">\n              <p class=\"card-title p2\"><strong>Buy Now, Pay Later<\/strong><\/p>\n              <span class=\"card-time\">5 min read<\/span>\n              <p class=\"card-text small\">There are applications on the market that allow you to pay by instalment.<\/p>\n            <\/div>\n          <\/div>\n\n              <\/div>\n              <br>\n              <br>\n              <div class=\"cards__wrapper\">\n\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":71,"featured_media":12071,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[1],"tags":[175],"class_list":["post-12063","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware, the cyberattack that hijacks files - 11Onze<\/title>\n<meta name=\"description\" content=\"Find out what ransomware is, how to avoid it, and what to do if your computer has been infected by this malicious software.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.11onze.cat\/en\/magazine\/ransomware-cyberattack-files\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware, the cyberattack that hijacks files - 11Onze\" \/>\n<meta property=\"og:description\" content=\"Find out what ransomware is, how to avoid it, and what to do if your computer has been infected by this malicious software.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.11onze.cat\/en\/magazine\/ransomware-cyberattack-files\/\" \/>\n<meta property=\"og:site_name\" content=\"11Onze Comunitat Fintech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/11OnzeComunitat\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-24T19:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-24T19:10:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.11onze.cat\/wp-content\/uploads\/2021\/07\/11ONZE_RANSOMWARE.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Equip Editorial\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Ransomware, the cyberattack that hijacks files - 11Onze\" \/>\n<meta name=\"twitter:description\" content=\"Find out what ransomware is, how to avoid it, and what to do if your computer has been infected by this malicious software.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.11onze.cat\/wp-content\/uploads\/2021\/07\/11ONZE_RANSOMWARE.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@11OnzeFintech\" \/>\n<meta name=\"twitter:site\" content=\"@11OnzeFintech\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Equip Editorial\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/magazine\\\/ransomware-cyberattack-files\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/magazine\\\/ransomware-cyberattack-files\\\/\"},\"author\":{\"name\":\"Equip Editorial\",\"@id\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/#\\\/schema\\\/person\\\/636d99b4c82bb7178687ecd43c3a61bd\"},\"headline\":\"Ransomware, the cyberattack that hijacks files\",\"datePublished\":\"2024-02-24T19:00:00+00:00\",\"dateModified\":\"2024-02-24T19:10:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/magazine\\\/ransomware-cyberattack-files\\\/\"},\"wordCount\":6,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/magazine\\\/ransomware-cyberattack-files\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.11onze.cat\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/THUMBNAIL_RANSOMWARE.jpg\",\"keywords\":[\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.11onze.cat\\\/en\\\/magazine\\\/ransomware-cyberattack-files\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/magazine\\\/ransomware-cyberattack-files\\\/\",\"url\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/magazine\\\/ransomware-cyberattack-files\\\/\",\"name\":\"Ransomware, the cyberattack that hijacks files - 11Onze\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/magazine\\\/ransomware-cyberattack-files\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/magazine\\\/ransomware-cyberattack-files\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.11onze.cat\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/THUMBNAIL_RANSOMWARE.jpg\",\"datePublished\":\"2024-02-24T19:00:00+00:00\",\"dateModified\":\"2024-02-24T19:10:57+00:00\",\"description\":\"Find out what ransomware is, how to avoid it, and what to do if your computer has been infected by this malicious software.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/magazine\\\/ransomware-cyberattack-files\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.11onze.cat\\\/en\\\/magazine\\\/ransomware-cyberattack-files\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/magazine\\\/ransomware-cyberattack-files\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.11onze.cat\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/THUMBNAIL_RANSOMWARE.jpg\",\"contentUrl\":\"https:\\\/\\\/www.11onze.cat\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/THUMBNAIL_RANSOMWARE.jpg\",\"width\":1500,\"height\":1000,\"caption\":\"Dangerous Hooded Hacker using credit card typing bad data into computer online system and spreading to global stolen personal information. Cyber security concept\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/magazine\\\/ransomware-cyberattack-files\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware, the cyberattack that hijacks files\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/\",\"name\":\"11Onze Comunitat Fintech\",\"description\":\"First digital fintech community in Catalonia\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/#organization\",\"name\":\"11Onze Comunitat Fintech\",\"url\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.11onze.cat\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/512x512-11Onze.jpg\",\"contentUrl\":\"https:\\\/\\\/www.11onze.cat\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/512x512-11Onze.jpg\",\"width\":512,\"height\":512,\"caption\":\"11Onze Comunitat Fintech\"},\"image\":{\"@id\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/11OnzeComunitat\",\"https:\\\/\\\/x.com\\\/11OnzeFintech\",\"https:\\\/\\\/www.instagram.com\\\/11onzecat\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/11onzebanc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCz63R8Byd_kBKtK2M4Qf_7w\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/#\\\/schema\\\/person\\\/636d99b4c82bb7178687ecd43c3a61bd\",\"name\":\"Equip Editorial\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.11onze.cat\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/HEADER_AGENTS_DECK-300x300.jpg\",\"url\":\"https:\\\/\\\/www.11onze.cat\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/HEADER_AGENTS_DECK-300x300.jpg\",\"contentUrl\":\"https:\\\/\\\/www.11onze.cat\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/HEADER_AGENTS_DECK-300x300.jpg\",\"caption\":\"Equip Editorial\"},\"url\":\"https:\\\/\\\/www.11onze.cat\\\/en\\\/magazine\\\/author\\\/equip-editorial-11onze\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware, the cyberattack that hijacks files - 11Onze","description":"Find out what ransomware is, how to avoid it, and what to do if your computer has been infected by this malicious software.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.11onze.cat\/en\/magazine\/ransomware-cyberattack-files\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware, the cyberattack that hijacks files - 11Onze","og_description":"Find out what ransomware is, how to avoid it, and what to do if your computer has been infected by this malicious software.","og_url":"https:\/\/www.11onze.cat\/en\/magazine\/ransomware-cyberattack-files\/","og_site_name":"11Onze Comunitat Fintech","article_publisher":"https:\/\/www.facebook.com\/11OnzeComunitat","article_published_time":"2024-02-24T19:00:00+00:00","article_modified_time":"2024-02-24T19:10:57+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.11onze.cat\/wp-content\/uploads\/2021\/07\/11ONZE_RANSOMWARE.jpg","type":"image\/jpeg"}],"author":"Equip Editorial","twitter_card":"summary_large_image","twitter_title":"Ransomware, the cyberattack that hijacks files - 11Onze","twitter_description":"Find out what ransomware is, how to avoid it, and what to do if your computer has been infected by this malicious software.","twitter_image":"https:\/\/www.11onze.cat\/wp-content\/uploads\/2021\/07\/11ONZE_RANSOMWARE.jpg","twitter_creator":"@11OnzeFintech","twitter_site":"@11OnzeFintech","twitter_misc":{"Written by":"Equip Editorial","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.11onze.cat\/en\/magazine\/ransomware-cyberattack-files\/#article","isPartOf":{"@id":"https:\/\/www.11onze.cat\/en\/magazine\/ransomware-cyberattack-files\/"},"author":{"name":"Equip Editorial","@id":"https:\/\/www.11onze.cat\/en\/#\/schema\/person\/636d99b4c82bb7178687ecd43c3a61bd"},"headline":"Ransomware, the cyberattack that hijacks files","datePublished":"2024-02-24T19:00:00+00:00","dateModified":"2024-02-24T19:10:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.11onze.cat\/en\/magazine\/ransomware-cyberattack-files\/"},"wordCount":6,"commentCount":0,"publisher":{"@id":"https:\/\/www.11onze.cat\/en\/#organization"},"image":{"@id":"https:\/\/www.11onze.cat\/en\/magazine\/ransomware-cyberattack-files\/#primaryimage"},"thumbnailUrl":"https:\/\/www.11onze.cat\/wp-content\/uploads\/2021\/07\/THUMBNAIL_RANSOMWARE.jpg","keywords":["Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.11onze.cat\/en\/magazine\/ransomware-cyberattack-files\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.11onze.cat\/en\/magazine\/ransomware-cyberattack-files\/","url":"https:\/\/www.11onze.cat\/en\/magazine\/ransomware-cyberattack-files\/","name":"Ransomware, the cyberattack that hijacks files - 11Onze","isPartOf":{"@id":"https:\/\/www.11onze.cat\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.11onze.cat\/en\/magazine\/ransomware-cyberattack-files\/#primaryimage"},"image":{"@id":"https:\/\/www.11onze.cat\/en\/magazine\/ransomware-cyberattack-files\/#primaryimage"},"thumbnailUrl":"https:\/\/www.11onze.cat\/wp-content\/uploads\/2021\/07\/THUMBNAIL_RANSOMWARE.jpg","datePublished":"2024-02-24T19:00:00+00:00","dateModified":"2024-02-24T19:10:57+00:00","description":"Find out what ransomware is, how to avoid it, and what to do if your computer has been infected by this malicious software.","breadcrumb":{"@id":"https:\/\/www.11onze.cat\/en\/magazine\/ransomware-cyberattack-files\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.11onze.cat\/en\/magazine\/ransomware-cyberattack-files\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.11onze.cat\/en\/magazine\/ransomware-cyberattack-files\/#primaryimage","url":"https:\/\/www.11onze.cat\/wp-content\/uploads\/2021\/07\/THUMBNAIL_RANSOMWARE.jpg","contentUrl":"https:\/\/www.11onze.cat\/wp-content\/uploads\/2021\/07\/THUMBNAIL_RANSOMWARE.jpg","width":1500,"height":1000,"caption":"Dangerous Hooded Hacker using credit card typing bad data into computer online system and spreading to global stolen personal information. Cyber security concept"},{"@type":"BreadcrumbList","@id":"https:\/\/www.11onze.cat\/en\/magazine\/ransomware-cyberattack-files\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.11onze.cat\/en\/"},{"@type":"ListItem","position":2,"name":"Ransomware, the cyberattack that hijacks files"}]},{"@type":"WebSite","@id":"https:\/\/www.11onze.cat\/en\/#website","url":"https:\/\/www.11onze.cat\/en\/","name":"11Onze Comunitat Fintech","description":"First digital fintech community in Catalonia","publisher":{"@id":"https:\/\/www.11onze.cat\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.11onze.cat\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.11onze.cat\/en\/#organization","name":"11Onze Comunitat Fintech","url":"https:\/\/www.11onze.cat\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.11onze.cat\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.11onze.cat\/wp-content\/uploads\/2021\/04\/512x512-11Onze.jpg","contentUrl":"https:\/\/www.11onze.cat\/wp-content\/uploads\/2021\/04\/512x512-11Onze.jpg","width":512,"height":512,"caption":"11Onze Comunitat Fintech"},"image":{"@id":"https:\/\/www.11onze.cat\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/11OnzeComunitat","https:\/\/x.com\/11OnzeFintech","https:\/\/www.instagram.com\/11onzecat\/","https:\/\/www.linkedin.com\/company\/11onzebanc","https:\/\/www.youtube.com\/channel\/UCz63R8Byd_kBKtK2M4Qf_7w"]},{"@type":"Person","@id":"https:\/\/www.11onze.cat\/en\/#\/schema\/person\/636d99b4c82bb7178687ecd43c3a61bd","name":"Equip Editorial","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.11onze.cat\/wp-content\/uploads\/2022\/05\/HEADER_AGENTS_DECK-300x300.jpg","url":"https:\/\/www.11onze.cat\/wp-content\/uploads\/2022\/05\/HEADER_AGENTS_DECK-300x300.jpg","contentUrl":"https:\/\/www.11onze.cat\/wp-content\/uploads\/2022\/05\/HEADER_AGENTS_DECK-300x300.jpg","caption":"Equip Editorial"},"url":"https:\/\/www.11onze.cat\/en\/magazine\/author\/equip-editorial-11onze\/"}]}},"_links":{"self":[{"href":"https:\/\/www.11onze.cat\/en\/wp-json\/wp\/v2\/posts\/12063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.11onze.cat\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.11onze.cat\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.11onze.cat\/en\/wp-json\/wp\/v2\/users\/71"}],"replies":[{"embeddable":true,"href":"https:\/\/www.11onze.cat\/en\/wp-json\/wp\/v2\/comments?post=12063"}],"version-history":[{"count":0,"href":"https:\/\/www.11onze.cat\/en\/wp-json\/wp\/v2\/posts\/12063\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.11onze.cat\/en\/wp-json\/wp\/v2\/media\/12071"}],"wp:attachment":[{"href":"https:\/\/www.11onze.cat\/en\/wp-json\/wp\/v2\/media?parent=12063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.11onze.cat\/en\/wp-json\/wp\/v2\/categories?post=12063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.11onze.cat\/en\/wp-json\/wp\/v2\/tags?post=12063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}